Filters








4,297 Hits in 4.1 sec

Hardware Trojans

K. Xiao, D. Forte, Y. Jin, R. Karri, S. Bhunia, M. Tehranipoor
2016 ACM Transactions on Design Automation of Electronic Systems  
In this article, we examine the research on hardware Trojans from the last decade and attempt to capture the lessons learned.  ...  We also identify the most critical lessons for those new to the field and suggest a roadmap for future hardware Trojan research.  ...  LESSON #3: BE MORE VIGILANT AGAINST THE UNSOLVED PROBLEMS The previous sections discussed the past research, current and future Trojan attack models, and the trends of current hardware Trojan research.  ... 
doi:10.1145/2906147 fatcat:24ffmzsrnbgkrkjq3ooztg4fbe

Implementing hardware Trojans: Experiences from a hardware Trojan challenge

Georg T. Becker, Ashwin Lakshminarasimhan, Lang Lin, Sudheendra Srivathsa, Vikram B. Suresh, Wayne Burelson
2011 2011 IEEE 29th International Conference on Computer Design (ICCD)  
In this work, we present a set of novel hardware Trojans aimed at evading detection methods, designed as part of the CSAW Embedded System Challenge 2010.  ...  Hardware Trojans have become a growing concern in the design of secure integrated circuits.  ...  A similar approach of fingerprinting both the chip frequency and the dynamic current [8] is proposed as a non-invasive side-channel analysis based detection technique.  ... 
doi:10.1109/iccd.2011.6081414 dblp:conf/iccd/BeckerLLSSB11 fatcat:dsg7ez5yabcbpghahsfa2yvgie

Scalable Hardware Trojan Diagnosis

Sheng Wei, Miodrag Potkonjak
2012 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
Hardware Trojans (HTs) pose a significant threat to the modern and pending integrated circuit (IC).  ...  Due to the diversity of HTs and intrinsic process variation (PV) in IC design, detecting and locating HTs is challenging.  ...  INTRODUCTION H ARDWARE TROJANs (HTs) [2] are malicious hardware components embedded by adversaries in order to make the IC design malfunction or leak confidential information.  ... 
doi:10.1109/tvlsi.2011.2147341 fatcat:azuvovt4inhbna6ztk7ur7n2qe

Trustworthy Hardware: Identifying and Classifying Hardware Trojans

Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld, Mohammad Tehranipoor
2010 Computer  
Acknowledgments The work of Ramesh Karri and his group is supported in part by National Science Foundation grants ECCS-0621856, CNS-0619741, CNS-0831349, and CNS-0958510 and AFRL grant FA8750-09-1-0146  ...  The authors also acknowledge the contributions of the organizers of ESC 2007 and 2008, Vikram Padman and Efstratios Gavas.  ...  Like many areas of security, hardware trust requires constant effort and a proactive approach.  ... 
doi:10.1109/mc.2010.299 fatcat:ueck7qhg3jh7xl3bw6zitcsrx4

Hardware Trojan: Threats and emerging solutions

Rajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia
2009 2009 IEEE International High Level Design Validation and Test Workshop  
In this paper, we analyze the threat posed by hardware Trojans and the methods of deterring them.  ...  Next, we discuss the major challenges associated with this security concern and future research needs to address them.  ...  based Trojan detection approaches are based on observing the effect of an inserted Trojan on a physical parameter such as circuit current transient, power consumption or path delay.  ... 
doi:10.1109/hldvt.2009.5340158 dblp:conf/hldvt/ChakrabortyNB09 fatcat:nwfljlx2eva75nrzu7bkgjvqdi

Hardware Trojan Identification And Detection

Samer Moein, Fayez Gebali, T. Aaron Gulliver, Abdulrahman Alkandari
2017 Zenodo  
Based on this concept, a detailed examination of current trojan detection techniques and the characteristics of existing hardware trojans is presented.  ...  This is used to develop a new approach to hardware trojan identification and classification. This identification can be used to compare trojan risk or severity and trojan detection effectiveness.  ...  Section 2 reviews hardware trojan attributes and existing hardware trojan detection techniques to illustrate the proposed approach to trojan identification.  ... 
doi:10.5281/zenodo.1181689 fatcat:uspeyy5jzjhfxkv6xbp5nuhh54

Hardware Trojan Attacks: Threat Analysis and Countermeasures

Swarup Bhunia, Michael S. Hsiao, Mainak Banga, Seetharam Narasimhan
2014 Proceedings of the IEEE  
This paper is a survey of the state-of-the-art Trojan attacks, modeling, and countermeasures.  ...  Next, we present several side-channel analysis approaches based on different parameters such as transient current, static current, and path delay, and discuss their challenges and effectiveness. 1) Static  ...  Third, with respect to observing Trojan effects in physical parameters, e.g., delay and supply current, process and measurement noise pose a major challenge.  ... 
doi:10.1109/jproc.2014.2334493 fatcat:kxnyfwrk6jgqrmdpga33odvofq

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

Simranjeet Sidhu, Bassam J. Mohd, Thaier Hayajneh
2019 Journal of Sensor and Actuator Networks  
A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware.  ...  However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security.  ...  B.J.M. was responsible for guiding the hardware security part, helped in the security analysis and writing the paper.  ... 
doi:10.3390/jsan8030042 fatcat:zuzw6sf2hzgdfiz65p2joz2g6a

Towards a Hardware Trojan Detection Cycle

Adrian Dabrowski, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar Weippl
2014 2014 Ninth International Conference on Availability, Reliability and Security  
Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat.  ...  Recently, the scientific community started to propose technical approaches to mitigate the threat of unspecified and potentially malicious functionality.  ...  ACKNOWLEDGMENTS This work was supported by the FIT-IT program (project number 835922) and the COMET K1 program by FFG (Austrian Research Funding Agency).  ... 
doi:10.1109/ares.2014.45 dblp:conf/IEEEares/DabrowskiHUKW14 fatcat:6n7dbitosrdlthrksdgfftus5y

Hardware Trojan Detection Using Controlled Circuit Aging [article]

Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Kanad Basu, Jörg Henkel, Ramesh Karri, Farshad Khorrami
2020 arXiv   pre-print
We simulate the golden IC and show robustness to IC-to-IC manufacturing variations. The approach is effective and can detect a Trojan even if we place it far off the critical paths.  ...  This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.  ...  Hardware Trojans are critical threats to military, finance, transportation and corporate or consumer electronics [8] . A Hardware Trojan has two parts -trigger and payload.  ... 
arXiv:2004.02997v3 fatcat:s6ky3xitlnanjn7mnbjdihu32i

New design strategy for improving hardware Trojan detection and reducing Trojan activation time

Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic
2009 2009 IEEE International Workshop on Hardware-Oriented Security and Trust  
Hardware Trojans in integrated circuits and systems have become serious concern to fabless semiconductor industry and government agencies in recent years.  ...  From the authentication stand point, time to trigger a hardware Trojan circuit is a a major concern.  ...  Acknowledgements The work of Hassan Salmani and Mohammad Tehranipoor was supported in part by the National Science Foundation Grant CNS-0716535.  ... 
doi:10.1109/hst.2009.5224968 dblp:conf/host/SalmaniTP09 fatcat:a72a434g4vdavkxaq3pdljenai

Electromagnetic circuit fingerprints for Hardware Trojan detection

Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
2015 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC)  
Integrated circuit counterfeits, relabeled parts and maliciously modified integrated circuits (so-called Hardware Trojan horses) are a recognized emerging threat for embedded systems in safety or security  ...  The results show that our method is able to detect most of our test Hardware Trojans but also highlight the difficulty of measuring emanations of unrealistically tiny Hardware Trojans.  ...  The results show that our method is able to detect most of our test Hardware Trojans but also highlight the difficulty of measuring emanations of unrealistically tiny Hardware Trojans.  ... 
doi:10.1109/isemc.2015.7256167 fatcat:almrucbsprgm5aw3tgsxldpvci

Experiences in Hardware Trojan design and implementation

Yier Jin, Nathan Kupp, Yiorgos Makris
2009 2009 IEEE International Workshop on Hardware-Oriented Security and Trust  
We report our experiences in designing and implementing several hardware Trojans within the framework of the Embedded System Challenge competition that was held as part of the Cyber Security Awareness  ...  Our work, which earned second place in the aforementioned competition, demonstrates that current RTL designs are, indeed, quite vulnerable to hardware Trojan attacks. 978-1-4244-4804-3/09/$25.00 c 2009  ...  In order to demonstrate the threat of hardware Trojans and provide an extensive view on what Trojans will look like, The Polytechnic Institute of NYU hosted an Embedded Systems Challenge competition in  ... 
doi:10.1109/hst.2009.5224971 dblp:conf/host/JinKM09 fatcat:7m2fbyq5nfbwba2uir7h6mmpxu

Improving hardware Trojan detection by retiming

Seyed Mohammad Hossein Shekarian, Morteza Saheb Zamani
2015 Microprocessors and microsystems  
Hardware Trojan horses (HTHs) are challenging threats to the security of silicon chips. A promising solution is path-delay fingerprinting for HTH detection.  ...  Experimental results show that TDR can increase the HDP up to more than 90% at the cost of one clock cycle latency and a reasonable area overhead.  ...  Introduction During the last decade, hardware Trojan attack has emerged as an important security challenge in the world of silicon chips [1, 2] .  ... 
doi:10.1016/j.micpro.2015.02.002 fatcat:f2kjv3muubhofi75emnxsa3mz4

Hardware Trojan Detection Using Controlled Circuit Aging

Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Kanad Basu, Jorg Henkel, Ramesh Karri, Farshad Khorrami
2020 IEEE Access  
The efficacy of our approach is shown on gate-level simulations on Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) crypto circuits with different Trojans that show different challenges  ...  Hardware Trojans are critical threats to military, finance, transportation and corporate or consumer electronics [8] . A Hardware Trojan has two parts -trigger and payload.  ...  He cofounded the Trust-Hub (http://trust-hub.org) and organizes the Embedded Systems Challenge (https://csaw.engineering.nyu.edu/esc), the annual red team blue team event.  ... 
doi:10.1109/access.2020.2989735 fatcat:lefwri5cqjeh7ghi3vk3jpoaku
« Previous Showing results 1 — 15 out of 4,297 results